{"id":"https://openalex.org/W2565020460","doi":"https://doi.org/10.1109/milcom.2016.7795481","title":"CyberVAN: A Cyber Security Virtual Assured Network testbed","display_name":"CyberVAN: A Cyber Security Virtual Assured Network testbed","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2565020460","doi":"https://doi.org/10.1109/milcom.2016.7795481","mag":"2565020460"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103911831","display_name":"Ritu Chadha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ritu Chadha","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108605748","display_name":"Thomas F. Bowen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Bowen","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110132499","display_name":"Cho\u2010Yu Jason Chiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cho-Yu J. Chiang","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045936266","display_name":"Yitzchak M. Gottlieb","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yitzchak M. Gottlieb","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050745939","display_name":"Alex Poylisher","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alex Poylisher","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018895579","display_name":"Sapello Angello","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Angello Sapello","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006514612","display_name":"Constantin Serban","orcid":"https://orcid.org/0009-0000-7259-9460"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Constantin Serban","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008074294","display_name":"Shridatt Sugrim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shridatt Sugrim","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018396979","display_name":"Gary Walther","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gary Walther","raw_affiliation_strings":["Applied Communication Sciences, Basking Ridge, NJ"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, Basking Ridge, NJ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046238604","display_name":"Lisa M. Marvel","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210088792","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lisa M. Marvel","raw_affiliation_strings":["Network Science Division, CISD U.S. Army Research Laboratory, MD"],"affiliations":[{"raw_affiliation_string":"Network Science Division, CISD U.S. Army Research Laboratory, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076141024","display_name":"E. Allison Newcomb","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210088792","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"E. Allison Newcomb","raw_affiliation_strings":["Network Science Division, CISD U.S. Army Research Laboratory, MD"],"affiliations":[{"raw_affiliation_string":"Network Science Division, CISD U.S. Army Research Laboratory, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112236759","display_name":"Jonathan Santos","orcid":null},"institutions":[{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]},{"id":"https://openalex.org/I4210088792","display_name":"United States Army","ror":"https://ror.org/00afsp483","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Santos","raw_affiliation_strings":["Cyber Security Division, S&TCD U.S. Army CERDEC, MD"],"affiliations":[{"raw_affiliation_string":"Cyber Security Division, S&TCD U.S. Army CERDEC, MD","institution_ids":["https://openalex.org/I1304082316","https://openalex.org/I4210088792"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.754,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":49,"citation_normalized_percentile":{"value":0.999879,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.9123105},{"id":"https://openalex.org/keywords/blueprint","display_name":"Blueprint","score":0.73159397},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4135611}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.9123105},{"id":"https://openalex.org/C155911762","wikidata":"https://www.wikidata.org/wiki/Q422321","display_name":"Blueprint","level":2,"score":0.73159397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6702728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6307069},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44565958},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4135611},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16699633},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.112942964},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1987125125","https://openalex.org/W2068403922","https://openalex.org/W2071902012","https://openalex.org/W2096611699","https://openalex.org/W2108962038","https://openalex.org/W2152801641","https://openalex.org/W2205903887","https://openalex.org/W2561815404"],"related_works":["https://openalex.org/W4386107585","https://openalex.org/W4385452110","https://openalex.org/W4313254666","https://openalex.org/W3161368317","https://openalex.org/W3110311961","https://openalex.org/W2972971880","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W2360633292","https://openalex.org/W1153919619"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3],"describe":[4],"CyberVAN,":[5],"a":[6,65],"Cyber":[7,77],"Security":[8,78],"Virtual":[9],"Assured":[10],"Network":[11],"testbed.":[12],"CyberVAN":[13,34,72],"enables":[14],"speedy":[15],"and":[16,44,47,54,64,94,102],"flexible":[17],"setup":[18],"of":[19,28,61,67],"high-fidelity":[20],"cyber":[21,32,40,91],"security":[22,41],"scenarios":[23],"to":[24,75,88,98],"evaluate":[25,89],"the":[26,68,99],"effectiveness":[27],"both":[29,52],"novel":[30],"existing":[31],"technologies.":[33],"provides":[35],"many":[36],"features":[37],"needed":[38],"by":[39],"researchers,":[42],"developers":[43],"practitioners":[45],"alike,":[46],"can":[48],"be":[49],"used":[50,87],"for":[51],"verification":[53],"validation":[55],"purposes.":[56],"We":[57],"provide":[58],"an":[59],"overview":[60],"CyberVAN's":[62],"functionality":[63],"blueprint":[66],"envisioned":[69],"roadmap.":[70],"Currently":[71],"is":[73,85],"available":[74],"ARL":[76],"CRA":[79],"(Collaborative":[80],"Research":[81],"Alliance)":[82],"members.":[83],"It":[84],"being":[86],"CRA-developed":[90],"defense":[92],"technologies":[93],"assess":[95],"their":[96],"applicability":[97],"military":[100],"strategic":[101],"tactical":[103],"network":[104],"environments.":[105]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2565020460","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-01-07T04:35:56.549427","created_date":"2017-01-06"}